Buy with Confidence

More Views

Details

Safe and productive browsing the net

With our Secure Web Gateway prevent malware infections and stop spyware and viruses before they enter your network. You can also quickly and easily create policies that govern where and when your employees are allowed to surf the internet.

Proven protection against threats from the network

We stop current IT threats from the Internet with sophisticated techniques such as JavaScript, emulation and live testing on the cloud and feel harmful Webcode on already, before it reaches the browser. We also prevent sensitive data are infected systems to the outside. Our engine scans all HTTP, HTTPS, FTP, SMTP, and OP3 traffic, including active content such as ActiveX, Flash, Cookies, VBScript, Java, and JavaScript.

Customizable URL filtering for increased productivity

Our constantly updated database contains over 35 million sites in 96 categories. So you can create secure Guidelines for Internet surfing, minimize liability risks associated with inappropriate content, and increase productivity. Policies can be set for individual users or groups. Various authentication options are available , including IP address, eDirectory SSO , LDAP and Active Directory SSO ( in transparent mode ) .

Controlled use of applications

Determine with our Deep - Layer 7 inspection ( Next-Generation Firewall ) , locked which Web applications are to be allowed and prioritized. They can , for example, block Facebook and increase the bandwidth for Salesforce . About 900 applications can be identified. You will also receive feedback on unclassified applications.

Everything in view with dynamic reports

You get standard detailed reports that are stored locally. Separate tools are not required. Predefined and customizable reports give information about the main activities on the Internet as visited domains and bandwidth used . Clear history charts show usage trends by IP address or username. Thanks to the anonymity of reports username will be hidden. It 's possible to display only at the four- eyes principle again .

HTTPS scans

Scan "man-in-the-middle" for unlocking and re-keying to filter HTTPS traffic using our method and malware threats with in-depth reviews in the encrypted Internet traffic. Or contact our transparent high-pass option simply URL guidelines for HTTPS. With both methods, you block programs that tunnel over HTTPS (eg anonymizing proxy server). In addition, certificates are automatically validated, lest the user must decide which sites are assessed as trustworthy